June 14, 2024
June 14, 2024
Today’s must read thread.
The House Homeland Security Committee is beginning its hearing with Microsoft President @BradSmi about the company's "cascade of security failures": https://t.co/cdteOuil4c
— Eric Geller (@ericgeller) June 13, 2024
Background reading for those catching up: https://t.co/1KTM7O8QR9
Thread by @ericgeller on Thread Reader App – Thread Reader App
@ericgeller: The House Homeland Security Committee is beginning its hearing with Microsoft President @BradSmi about the company's "cascade of security failures": Background reading for those catching up: homeland.ho...…
joint work from @Google TAG and @Mandiant 🤝 on threats to 🇧🇷🇧🇷. new insights on financially motivated actors 🍍🦹 and APT actors from 🇨🇳🇰🇵.https://t.co/iIi4Cpz6w7
— billy leonard (@billyleonard) June 13, 2024
It appears #chatcontrol is back from the dead - this new law demands we hand over all media and links we send to the EU police under the guise of « saving the children »!
— harryhalpin (@harryhalpin) June 13, 2024
I sure don’t trust the police with my private messages, and neither should you! https://t.co/IUZ0F0kBtV
CVE-2024-32896 which is marked as being actively exploited in the wild in the June 2024 Pixel Update Bulletin is the 2nd part of the fix for CVE-2024-29748 vulnerability we described here:https://t.co/c4xnnbje04
— GrapheneOS (@GrapheneOS) June 13, 2024
As we explained there, none of this is actually Pixel specific.
Amsterdam pledges to remove cameras manufactured by Chinese firms across the city due to concerns over the risk of spying and human rights violations https://t.co/PXKXVxit71 via @technology
— Dr. Dan Lomas (@Sandbagger_01) June 14, 2024
2017 called. It wants its cringeworthy analogies for the SVR trying to retain cyber access to compromised organizations back. https://t.co/753txwGYUC pic.twitter.com/hBag9tsof7
— Brian in Pittsburgh (@arekfurt) June 13, 2024
BTIGhidra: Ghidra plugin by @trailofbits to infer type information from binaries
— 0xor0ne (@0xor0ne) June 14, 2024
Blog post: https://t.co/HP2iUUzw5r
Github: https://t.co/9Iiv2Ivrzh#reverseengineering pic.twitter.com/4qPFFuxTUs